In this webinar, we’ll go over Azure Databricks, and explore where and how it fits into the Azure Data Platform. This will be followed by a live demo on the core functionality.
Often times you’ll be iterating on your model to try to get it to perform well with new data, so you’ll be training on it for each of those iterations. However, once you feel like you have a model that you believe is good to use, what do you do next? In this post, we’ll…
Docker Hub is a blessing and a curse at times. It’s a great way to share Docker images to the public, but it can be used by hackers to sneak code into environments with malicious intent. Recently, a hacker uploaded images into Docker Hub that were downloaded over 5,000,000 times. The intent was to turn…
While backups are often one of the most overlooked planks in a comprehensive data security plan, they are are probably among the most important things one can do for data security. It’s works as an insurance policy against data loss which can be caused by a myriad of things ranging from accidental deletion, to drive…
When you think of data science and machine learning two programming languages are going to instantly pop into your mind: Python and R. These two languages are great and I love working with them, but coming from a .NET and C# background myself it would be nice to see some love for data science in…
If you’ve done even a short amount of research into data science, there is no doubt you’ve come across the Python vs. R debate. While we won’t get into which is better, there is nothing wrong with knowing both. You may be stronger in one than the other, and even prefer that one, but knowing…
In this webinar, we’ll take a tour of the available tools provided by Scikit-Learn, then uncover the distinction between an estimator and a function, which is key to understanding how to use the API.
A personal VPN is a nice way of securing traffic between your device and the Internet. Securing your traffic is good for several reasons including safe browsing when one is away from a trusted network like one’s home or office. Untrusted networks would be those at coffee shops, airports, hotels, public libraries, and other places…
Did you know that build and release tasks can be configured to execute based on logical conditions? Learn about this powerful feature for builds and releases.